William Yager writes:
>no cryptographer ever got hurt by being too paranoid, and not trusting
>hardware is a great place to start.
And while you're lying awake at night worrying whether the Men in Black
backdoored the CPU in your laptop, you're missing the fact that the
that's using the random numbers has 36 different buffer overflows, of which
are remote-exploitable, and the crypto uses an RSA exponent of 1 and
with a fixed IV.